Irresponsible and malicious journalism like this is why I have an immediate distrust against any sort of reporter that tries to talk to me. Probably irrational but still.
I hope your balls explode.
I wish him the very same.
Irresponsible and malicious journalism like this is why I have an immediate distrust against any sort of reporter that tries to talk to me. Probably irrational but still.
I hope your balls explode.
I wish him the very same.
Yup!
Never seen this before, but you can enable NFS debugging with ‘rpcdebug -m nfs -s all’ (or nfsd on the server, or rpc for the underlying protocol). It prints to dmesg.
That’s a killer feature. Sucks that it got removed.
IIRC Keepass2Android does have that feature.
Does that make an SBC a fancy tablet?
I’m not convinced this is a good idea. Resident keys as the primary mechanism were already a big mistake, syncing keys between devices was questionable at best (the original concept, which hardware keys still have, is the key can never be extracted), and now you’ve got this. One of the great parts about security keys (the original ones!) is that you authenticate devices instead of having a single secret shared between every device. This just seems like going further away from that in trying to engineer themselves out of the corner they got themselves into with bullshit decisions.
Let me link this post again (written by the Kanidm developer). Passkeys: A Shattered Dream. I think it still holds up.
I changed all the KDE shortcuts to be like on Mac (because I like those more). I have a keyboard with Mac layout for my Linux PC and have swapped meta and ctrl via the keyboard settings (i.e. you press ⌘C but software receives ctrl+c), because a lot of non-KDE apps are way worse about remapping shortcuts so if they really want ctrl I at least want it to be on the ⌘ key, and also because the meta key behaves weirdly at least in Qt, for example it doesn’t block text input when held down unlike ctrl.
These are the big annoyances with this that do trip me up:
iCloud Photos for some reason still only allows you to upload JPEG files from the web. Can’t even upload HEIC which makes absolutely no sense considering it’s now their main photo format.
But yeah, other than that it’s pretty good.
Wow, I didn’t know there was so much piracy on Android. At least much more so than on desktop computers (or Windows specifically I guess). Enough to make a dev stop even, not just the usual “oh no a few people are pirating our software that would otherwise not have bought it anyway”. I assumed it would be a relatively small percentage of more experienced users.
By mid-September, the iA team claimed to have spent five months making 55 updates to its app and privacy policy and was ready to scan its passports and verify its payment accounts.
Google then requested a CASA Tier 2 assessment. This needed to be done annually, either through an intensive self-directed process or through a corporate partner, like TAC Security or KPMG. By iA’s estimation, the labor and fees to do this would cost “one to two months of revenue” for "a pretty much meaningless scan,” iA suggested in its post.
This is just absolutely crazy. I feel like Google absolutely had it out for them because why would they make them go through this arduous bullshit process for what seems to be described as a text editor app here.
But giving up Factorio is a bridge too far.
Factorio has an ARM port, it runs great on my M2 MacBook. But even if it didn’t, Rosetta works well enough so that x86-only games are playable.
What they suggest sounds like setting up a bridge interface between your LAN and the VPN interface to connect the VPS with your LAN. That’s actually a good idea since it would not need you to have a separate /64 for your local network. In this case I’m pretty sure that your VPN needs to be a layer 2 VPN, i.e. transports whole ethernet frames instead of TCP/UDP only, for this to work correctly. Wireguard doesn’t do this, OpenVPN can for example.
To make the VPS a gateway, you need to configure it to forward packets between networks and then set it as your default route on the clients (with IPv6, default route is usually published using router advertisements, set up radvd service on your VPS for that). That’s pretty much it IIRC except for the firewall rules. Here’s an article that’s some cloud stuff but is also applicable to your situation: https://www.linode.com/docs/guides/linux-router-and-ip-forwarding/#enable-ip-forwarding
Hm, it doesn’t? I’m not behind CGNAT but I’m in a network I don’t control (university dorm) so my gateway is just another device in the local network and I don’t have a public IP which I control, which I feel like should effectively be the same thing as CGNAT, and it works for me. Maybe it isn’t the same.
The easy way is to just use tunnelbroker.net, that is what I currently have (this would use one of their assigned net blocks, not the one from the VPS). Set it up on the Pi, set up IP forwarding with appropriate firewall rules, make the Pi serve RA so clients can assign themselves an IP, done (IIRC).
If you want to set up the v6/v4 gateway yourself, I would do this with a /64 you can fully route to your home network like you would get with tunnelbroker.net because then you don’t have to deal with the network split and essentially two gateways for the same network (your Pi and the VPS), because otherwise your clients would assume the VPS is directly reachable since it’s in the same network when in reality it would have to go through the gateway (you would have to set up an extra route in that case on every client, I think). You’d need a second network from Oracle for this.
But it’s pretty much the same thing I would assume plus the setup on the VPS side, make the VPN route your /64 block (or use 6in4 which is what tunnelbroker.net uses), configure IP forwarding on the Pi and the VPS between the VPN interface and local/WAN respectively.
It’s marked as preorder (didn’t this already come out a while ago? maybe not on PC) but yeah, I can buy it too in Germany.
You’re looking for an OAuth-compatible identity provider (personally I use Kanidm, if Keycloak does that too that works, I’ve never used it). And then set it up as the auth mechanism for Immich, and whatever else you want: https://immich.app/docs/administration/oauth
I killed 3 Raspberry Pis by putting them onto a metal surface while turned on (first two times I didn’t know what was happening and the third time was accidental). Do not recommend.
At the very least you can see it in dmesg.